Secure Communication in Civil Drones

Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 576)

Abstract

The drone technology is attracting an increasing attention in civil applications. Secure communication is a critical requirement in many scenarios to provide an acceptable level of data confidentiality, integrity, and availability. In this chapter we first present a security analysis of civil drones. Then, a light-weight hardware solution is proposed to assure the confidentiality and integrity of both command data sent by the ground station and payload data transmitted by the drone. Using the developed prototype, finally, we investigate the impact of hardware accelerators on the power consumption of these power-constrained devices. We show that the advantage of hardware as a power-efficient computation platform is not necessarily valid for drones due to the extra hardware weight.

Keywords

Civil drones Security Cryptoengine Speedup Power consumption 

References

  1. 1.
    Quaritsch, M., Stojanovski, E., Bettstetter, C., Friedrich, G., Hellwagner, H., Rinner, B., Hofbaur, M., Shah, M.: Collaborative microdrones: applications and research challenges. In: Proceedings of the 2nd International Conference on Autonomic Computing and Communication Systems, p. 38. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) (2008)Google Scholar
  2. 2.
    Gancet, J., Hattenberger, G., Alami, R., Lacroix, S.: Task planning and control for a multi-UAV system: architecture and algorithms. In: 2005 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2005, pp. 1017–1022. IEEE (2005)Google Scholar
  3. 3.
    How, J., Bethke, B., Frank, A., Dale, D., Vian, J.: Real-time indoor autonomous vehicle test environment. IEEE Control Syst. Mag. 28, 51–64 (2008)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Hoffmann, G., Rajnarayan, D., Waslander, S., Dostal, D., Jang, J., Tomlin, C.: The stanford testbed of autonomous rotorcraft for multi agent control (STARMAC). In: The 23rd Digital Avionics Systems Conference, DASC 2004, vol. 2, p. 12-E. IEEE (2004)Google Scholar
  5. 5.
    Chiu, C., Lo, C.: Vision-only automatic flight control for small UAVs. IEEE Trans. Veh. Technol. 60, 2425–2437 (2011)CrossRefGoogle Scholar
  6. 6.
    Dierks, T., Jagannathan, S.: Output feedback control of a quadrotor UAV using neural networks. IEEE Trans. Neural Netw. 21, 50–66 (2010)CrossRefGoogle Scholar
  7. 7.
    Voos, H.: Nonlinear state-dependent riccati equation control of a quadrotor UAV. In: 2006 IEEE International Conference on Control Applications Computer Aided Control System Design, 2006 IEEE International Symposium on Intelligent Control, pp. 2547–2552. IEEE (2006)Google Scholar
  8. 8.
    Minguez, J., Montano, L.: Nearness diagram (ND) navigation: collision avoidance in troublesome scenarios. IEEE Trans. Robot. Autom. 20, 45–59 (2004)CrossRefGoogle Scholar
  9. 9.
    Yuan, C., Recktenwald, F., Mallot, H.: Visual steering of UAV in unknown environments. In: IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2009, pp. 3906–3911. IEEE (2009)Google Scholar
  10. 10.
    Zsedrovits, T., Zarandy, A., Vanek, B., Peni, T., Bokor, J., Roska, T.: Collision avoidance for UAV using visual detection. In: 2011 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 2173–2176. IEEE (2011)Google Scholar
  11. 11.
    Kim, A., Wampler, B., Goppert, J., Hwang, I., Aldridge, H.: Cyber attack vulnerabilities analysis for unmanned aerial vehicles. Infotech@ Aerospace (2012)Google Scholar
  12. 12.
    Shepard, D.P., Bhatti, J.A., Humphreys, T.E., Fansler, A.A.: Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. In: Proceedings of the ION GNSS Meeting, vol. 3 (2012)Google Scholar
  13. 13.
    Pelechrinis, K., Iliofotou, M., Krishnamurthy, V.: Denial of service attacks in wireless networks: the case of jammers. Commun. Surv. Tutorials 13, 245–257 (2011). IEEECrossRefGoogle Scholar
  14. 14.
    Bicakci, K., Tavli, B.: Denial-of-service attacks and countermeasures in IEEE 802.11 wireless networks. Comput. Stand. Interfaces 31, 931–941 (2009)CrossRefGoogle Scholar
  15. 15.
    Daemen, J., Rijmen, V.: The Design of Rijndael: AES-The Advanced Encryption Standard. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  16. 16.
    Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman & Hall, Boca Raton (2008)MATHGoogle Scholar
  17. 17.
    NIST: American national standard for financial institution key management (wholesale) (1985). http://csrc.nist.gov/publications/fips/
  18. 18.
    Krepa, M.: Jpeg encoder, project, mkjpeg. http://opencores.org/
  19. 19.
    ANG-UAVP: Next generation universal aerial videoplatform. http://ng.uavp.ch/moin/FrontPage
  20. 20.
    Mueller, M.: ecalc, on-line calculator for electric driven RC models. http://www.ecalc.ch/
  21. 21.
    Mansfield, K., Eveleigh, T., Holzer, T.H., Sarkani, S.: Unmanned aerial vehicle smart device ground control station cyber security threat model. In: 2013 IEEE International Conference on Technologies for Homeland Security (HST), pp. 722–728. IEEE (2013)Google Scholar
  22. 22.
    Joye, M., Neven, G.: Identity-Based Cryptography, vol. 2. IOS Press, Amsterdam (2009)MATHGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Abdulhadi Shoufan
    • 1
  • Hassan AlNoon
    • 2
  • Joonsang Baek
    • 1
  1. 1.Electrical and Computer Engineering DepartmentKhailfa UniversityAbu DhabiUnited Arab Emirates
  2. 2.Advanced Technology Consultancy L.L.CEmirates Advanced Investment Group L.L.CAbu DhabiUnited Arab Emirates

Personalised recommendations